mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 23:27:33 +02:00
155 lines
7.7 KiB
Markdown
155 lines
7.7 KiB
Markdown
### [CVE-2017-0143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html
|
|
- http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html
|
|
- https://www.exploit-db.com/exploits/41891/
|
|
- https://www.exploit-db.com/exploits/41987/
|
|
- https://www.exploit-db.com/exploits/43970/
|
|
|
|
#### Github
|
|
- https://github.com/000Sushant/hacking_windows7_using_metasploit
|
|
- https://github.com/15866095848/15866095848
|
|
- https://github.com/4n0nym0u5dk/MS17-010_CVE-2017-0143
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Acosta27/blue_writeup
|
|
- https://github.com/Al1ex/WindowsElevation
|
|
- https://github.com/AntonioPC94/Blue
|
|
- https://github.com/AntonioPC94/Ice
|
|
- https://github.com/ArcadeHustle/X3_USB_softmod
|
|
- https://github.com/ArminToric28/EternalBlue-Exploit
|
|
- https://github.com/Ascotbe/Kernelhub
|
|
- https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections
|
|
- https://github.com/Cruxer8Mech/Idk
|
|
- https://github.com/Cyberwatch/cyberwatch_api_powershell
|
|
- https://github.com/ErdemOzgen/ActiveDirectoryAttacks
|
|
- https://github.com/Esther7171/Ice
|
|
- https://github.com/GhostTroops/scan4all
|
|
- https://github.com/Guccifer808/doublepulsar-scanner-golang
|
|
- https://github.com/H3xL00m/MS17-010_CVE-2017-0143
|
|
- https://github.com/HacTF/poc--exp
|
|
- https://github.com/HattMobb/TryHackMe-Relevant-Machine-Writeup-Walkthrough
|
|
- https://github.com/InTheDarkness2102/CVE-2017-0143-MS-17-010-EternalBlue
|
|
- https://github.com/JMCumbrera/TryHackMe-Blue-WriteUp
|
|
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
|
|
- https://github.com/Juba0x4355/Blue-THM
|
|
- https://github.com/Juba0x4355/Blue-Writeup
|
|
- https://github.com/Kiosec/Windows-Exploitation
|
|
- https://github.com/Kiz619ao630/StepwisePolicy3
|
|
- https://github.com/Larry-Wilkes-CyberCloud/Nessus-Scans
|
|
- https://github.com/Lynk4/Windows-Server-2008-VAPT
|
|
- https://github.com/Micr067/Pentest_Note
|
|
- https://github.com/MinYoungLeeDev/Attack-Defense-Analysis-of-a-Vulnerable-Network
|
|
- https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker
|
|
- https://github.com/Nieuport/Active-Directory-Kill-Chain-Attack-Defense
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/PWN-Kingdom/Eternal-Scan
|
|
- https://github.com/PWN-Kingdom/Test_Tasks
|
|
- https://github.com/R-Vision/ms17-010
|
|
- https://github.com/R0B1NL1N/AD-Attack-Defense
|
|
- https://github.com/Ratlesv/Scan4all
|
|
- https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API
|
|
- https://github.com/SampatDhakal/Metasploit-Attack-Report
|
|
- https://github.com/SexyBeast233/SecBooks
|
|
- https://github.com/Singhsanjeev617/A-Red-Teamer-diaries
|
|
- https://github.com/TheLastochka/pentest
|
|
- https://github.com/Totes5706/TotesHTB
|
|
- https://github.com/UNO-Babb/CYBR1100
|
|
- https://github.com/Vaneshik/NTO2022
|
|
- https://github.com/Waxweasle/TryHackMe-Relevant-Pen-Test-Walkthrough
|
|
- https://github.com/Whiteh4tWolf/Attack-Defense
|
|
- https://github.com/Ygodsec/-
|
|
- https://github.com/Zeyad-Azima/Remedy4me
|
|
- https://github.com/ZyberPatrol/Active-Directory
|
|
- https://github.com/a1xbit/BlackBoxPenetrationTesting
|
|
- https://github.com/androidkey/MS17-011
|
|
- https://github.com/avboy1337/Vulnerabilities
|
|
- https://github.com/aymankhder/AD-attack-defense
|
|
- https://github.com/bb33bb/Vulnerabilities
|
|
- https://github.com/bhataasim1/AD-Attack-Defence
|
|
- https://github.com/blackend/Diario-RedTem
|
|
- https://github.com/bzynczy-chrobok/sda_project_02
|
|
- https://github.com/c0d3cr4f73r/MS17-010_CVE-2017-0143
|
|
- https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode
|
|
- https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode
|
|
- https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag-
|
|
- https://github.com/chaao195/EBEKv2.0
|
|
- https://github.com/chanderson-silva/Pentest-Guide
|
|
- https://github.com/crypticdante/MS17-010_CVE-2017-0143
|
|
- https://github.com/czq945659538/-study
|
|
- https://github.com/drg3nz0/gpt-analyzer
|
|
- https://github.com/dvanmosselbeen/TryHackMe_writeups
|
|
- https://github.com/ericjiang97/SecScripts
|
|
- https://github.com/fdff87554/Cycraft-Interview-Project-2022
|
|
- https://github.com/fei9747/WindowsElevation
|
|
- https://github.com/geeksniper/active-directory-pentest
|
|
- https://github.com/ginapalomo/ScanAll
|
|
- https://github.com/giterlizzi/secdb-feeds
|
|
- https://github.com/gwyomarch/Legacy-HTB-Writeup-FR
|
|
- https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense-
|
|
- https://github.com/hktalent/scan4all
|
|
- https://github.com/homjxi0e/Script-nmap-scan-ms17-010
|
|
- https://github.com/ihebski/A-Red-Teamer-diaries
|
|
- https://github.com/infosecn1nja/AD-Attack-Defense
|
|
- https://github.com/jeredbare/ms17-010_to_slack
|
|
- https://github.com/k4u5h41/MS17-010_CVE-2017-0143
|
|
- https://github.com/k8gege/Aggressor
|
|
- https://github.com/k8gege/Ladon
|
|
- https://github.com/k8gege/PowerLadon
|
|
- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups
|
|
- https://github.com/liorsivan/hackthebox-machines
|
|
- https://github.com/lnick2023/nicenice
|
|
- https://github.com/lyshark/Windows-exploits
|
|
- https://github.com/mchklt/PFE
|
|
- https://github.com/merlinepedra/SCAN4LL
|
|
- https://github.com/merlinepedra25/SCAN4ALL-1
|
|
- https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense
|
|
- https://github.com/morpheuslord/GPT_Vuln-analyzer
|
|
- https://github.com/mynameisv/MMSBGA
|
|
- https://github.com/nadeemali79/AD-Attack-Defense
|
|
- https://github.com/nirsarkar/scan4all
|
|
- https://github.com/nonameyo/ThreatIntel-Barque
|
|
- https://github.com/notsag-dev/htb-legacy
|
|
- https://github.com/p0pp3t0n/MS17-010-Dockerfile
|
|
- https://github.com/paramint/AD-Attack-Defense
|
|
- https://github.com/program-smith/THM-Blue
|
|
- https://github.com/puckiestyle/A-Red-Teamer-diaries
|
|
- https://github.com/qazbnm456/awesome-cve-poc
|
|
- https://github.com/retr0-13/AD-Attack-Defense
|
|
- https://github.com/rosonsec/Exploits
|
|
- https://github.com/seeu-inspace/easyg
|
|
- https://github.com/sponkmonk/Ladon_english_update
|
|
- https://github.com/stormblack/smbvuln
|
|
- https://github.com/substing/blue_ctf
|
|
- https://github.com/sunylife24/TryHackMe2
|
|
- https://github.com/sunzu94/AD-Attack-Defense
|
|
- https://github.com/superhero1/OSCP-Prep
|
|
- https://github.com/sv3nbeast/Attack-Notes
|
|
- https://github.com/tataev/Security
|
|
- https://github.com/trhacknon/scan4all
|
|
- https://github.com/tufanturhan/Red-Teamer-Diaries
|
|
- https://github.com/uroboros-security/SMB-CVE
|
|
- https://github.com/valarauco/wannafind
|
|
- https://github.com/vkhalaim/Relevant---Penetration-Testing-Challenge-Solution-
|
|
- https://github.com/w3security/goscan
|
|
- https://github.com/wateroot/poc-exp
|
|
- https://github.com/wrlu/Vulnerabilities
|
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
|
- https://github.com/xiaoy-sec/Pentest_Note
|
|
- https://github.com/ycdxsb/Exploits
|
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
|
- https://github.com/yeriej77/Identifying-and-Exploiting-Vulnerabilities
|
|
- https://github.com/zhang040723/web
|
|
- https://github.com/zimmel15/HTBBlueWriteup
|
|
|